Latest publications 31 Oct 2025 Microsoft Exchange Server security best practices This paper—authored by the National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), and Canadian Centre for Cyber Security (Cyber Centre)—provides security best practices for administrators on hardening on-premises (on-prem) Exchange. 30 Oct 2025 Cyber security priorities for boards of directors 2025-26 This advice outlines questions boards can ask of management and their organisation to understand its cyber security posture in the current cyber threat environment. 28 Oct 2025 Creating and maintaining a definitive view of your operational technology architecture How organisations who deploy or operate operational technology systems should build, maintain and store their systems understanding. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 16 May 2024 Ten things to know about data security This publication has been developed to assist business owners and information technology managers, particularly those unfamiliar with cybersecurity, with ten things they should know about data security. 16 Apr 2024 Deploying AI systems securely AI security is a rapidly evolving area of research. As agencies, industry, and academia discover potential weaknesses in AI technology and techniques to exploit them, organizations will need to update their AI systems to address the changing risks, in addition to applying traditional IT best practices to AI systems. 26 Mar 2024 Travelling with mobile devices Learn how to keep mobile devices secure when travelling. This guidance provides advice from both an individual and organisational perspective. 21 Feb 2024 Blueprint for Secure Cloud The Blueprint provides better practice guidance, configuration guides and templates covering risk management, architecture and standard operating procedures developed as per the controls in ASD’s Information security manual (ISM). 24 Jan 2024 Engaging with artificial intelligence The purpose of this paper is to provide organisations with guidance on how to use artificial intelligence (AI) systems securely. The paper summarises some important threats related to AI systems and includes cybersecurity mitigation strategies to aid organisations in engaging with AI while managing risk. It provides mitigations to assist both organisations that maintain their own AI systems and organisations that use third-party AI systems. 18 Jan 2024 Cloud assessment and authorisation This publication is co-designed with industry to support the secure adoption of cloud services across government and industry. Pagination Previous page ‹‹ Page 10 Next page ›› Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary